Advantages and Disadvantages of Digital Signatures

Advantages and Disadvantages of Digital Signatures

I have often had to answer the question "what is digital signature technology?" Most times, the question has been asked by regular people, smart but not highly technical and often the best way to explain it is to draw parallels between electronic documents and paper documents. For example, when you […]

Read more ›

Best and Must-Have Free Antivirus Apps for Smartphones

Best and Must-Have Free Antivirus Apps for Smartphones

According to the re-known research firm IDC, over 216 million smart phones have been shipped worldwide by manufacturers in the first three months of this year alone. The same study indicates that 51.6% of all mobile phones used are now smartphones. While for most people this is good news as […]

Read more ›

Educating End-Users on Where Not to Save Critical Documents

Educating End-Users on Where Not to Save Critical Documents

The terms "shared" or "network" folder probably don't mean much to the average office computer user. The perception of the computing world from a non-technologically oriented person is that it's getting so incredibly complex so quickly, that one could never even hope to keep up with the basics of everyday […]

Read more ›

Most Terrifying Online Threats

Most Terrifying Online Threats

There’s no doubt that the Internet poses threats, despite all the excellent things it can do for us. Whether you’re on your phone, tablet, or computer, you need to watch out for the following four most terrifying online threats. 1. Trojan Horses A Trojan Horse is a type of malware […]

Read more ›

Ways to Remove Malicious Files from Your Computer

Ways to Remove Malicious Files from Your Computer

There are many good things about the internet, but it can also cause damage to your computer. You see, there are many websites that contain malicious files which can creep into your computer's system. When this happens and you don't act on it right away, your computer may not function […]

Read more ›

Microsoft Rolls Out Two-Factor Verification Across Its Services

Microsoft Rolls Out Two-Factor Verification Across Its Services

Following the initiatives of Google and Apple to make Internet use safer against hackers, Microsoft is rolling out a two-factor authentication system across its online and desktop products. The optional security measure which will be available in the next few days covers all Microsoft accounts, including Outlook.com, Skype, SkyDrive, Office, […]

Read more ›

What is DCID 6/3

What is DCID 6/3

Standing for “Director of Central Intelligence Directive section 6, part 3”, DCID 6/3 represents the C&A (certification and accreditation) methodology used on intelligence projects by federal agencies like the C.I.A. Anyone working on such projects must have SCI clearance (SCI stands for Sensitive Compartmentalized Information). Before DCID 6/3 come to […]

Read more ›

NIST and NIACAP phases

NIST and NIACAP phases

NIST and NIACAP are two frameworks providing accountability for people involved in the security of the information system. They refer to verification and validation of security controls, system characterization and risk assessment as well as accrediting decisions and certification recommendations. NIST is a process designed to deal with unclassified information […]

Read more ›

DITSCAP phases

DITSCAP phases

DITSCAP, developed by DISA (The Defense Information Systems Agency), serves for accrediting and evaluation of systems belonging to the Department of Defense. DITSCAP uses an infrastructure-centric approach for DoD systems. It is a mandatory element for all defense agencies for collecting, storing and processing information (either classified or unclassified). There […]

Read more ›

The Difference Between Crackers and Hackers

The Difference Between Crackers and Hackers

To understand the philosophy of a cracker vs. hacker, you must first understand the meaning of the two notions. There are differences between crackers and hackers considering the way they operate and their purposes. But let’s see. Upon me, the differentiation between the two notions is crystal-clear: – A cracker […]

Read more ›

How to Ensure Your WordPress Security

How to Ensure Your WordPress Security

Surprisingly, it is extremely easy to get caught up in the day-to-day running of your web site. There are endless jobs that need your attention such as PPC, keyword searches, content writing, and link building. But, "Don't get caught with your pants down," when it comes to security. We have been trained […]

Read more ›

What Are The Security Standards for Online Payment Merchants

What Are The Security Standards for Online Payment Merchants

During the early days of the internet, a large proportion of web users were anxious about paying for goods or services online. At this time, there were a lot of horror stories being about online fraud and poor data security doing the rounds. Thankfully, since the turn of the century, […]

Read more ›